BIOMETRICS IN FACIAL RECOGNITION

BIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITIONBIOMETRICS IN FACIAL RECOGNITION

BIOMETRIC TECHNIQUES IN FACIAL
RECOGNITION
JAYAM COLLEGE OF ENGINEERING AND TECHNOLOGY
DHARMAPURI - 635205
Submitted by:
UMAR.A. (CSE -IV)
KUMAR.V. (CSE - IV)
E-mail:
umarcse3@yahoo.com
kumarcse63@gmail.com
BIOMETRIC TECHNIQUES IN FACIAL RECOGNITION
ABSTRACT my password
Biometric technologies may seem exotic, but their use is becoming increasingly common,
and in 2001 MIT Technology Review named biometrics as one of the “top ten emerging
technologies that will change the world.” While this briefing focuses on facial
recognition, there are many different types of biometrics as Leonardo DA Vinci’s
Vitruvian Man makes clear. Covert capability .Facial recognition records the spatial
geometry of distinguishing features of the face. Different vendors use different methods
of facial recognition, however, all focus on measures of key features of the face. Because
a person’s face can be captured by a camera from some distance away, facial recognition
has a clandestine or covert capability.
INTRODUCTION:
“The automatic recognition of a person using distinguishing traits”.
A more expansive definition of biometrics is
Any automatically measurable, robust and distinctive physical characteristic or
personal trait that can be used to identify an individual or verify the claimed
identity of an individual.
This definition requires elaboration.
Measurable means that the characteristic or trait can be easily presented to a
sensor, located by it, and converted into a quantifiable, digital format. This measurability
allows for matching to occur in a matter of seconds and makes it an automated process.
The robustness of a biometric refers to the extent to which the characteristic or
trait is subject to significant changes over time. These changes can occur as a result of
age, injury, illness, occupational use, or chemical exposure. A highly robust biometric
does not change significantly over time while a less robust biometric will change. For
example, the iris, which changes very little over a person’s lifetime, is more robust than
one’s voice.
Distinctiveness is a measure of the variations or differences in the biometric
pattern among the general population. The higher the degree of distinctiveness, the more
individual is the identifier. A low degree of distinctiveness indicates a biometric pattern
found frequently in the general population. The iris and the retina have higher degrees of
distinctiveness than hand or finger geometry.
Biometrics is used for human recognition which consists of identification and
verification. The terms differ significantly. With identification, the biometric system
asks and attempts to answer the question, “Who is X?” In an identification application,
the biometric device reads a sample and compares that sample against every record or
template in the database. This type of comparison is called a “one-to-many” search (1:
N). Depending on how the system is designed, it can make a “best” match, or it can score
possible matches, ranking them in order of likelihood. Identification applications are
common when the goal is to identify criminals, terrorists, or other “wolves in sheep’s
clothing,” particularly through surveillance.
Verification occurs when the biometric system asks and attempts to answer the
question, “Is this X?” after the user claims to be X. In a verification application, the
biometric system requires input from the user, at which time the user claims his identity
via a password, token, or user name (or any combination of the three). This user input
points the system to a template in the database. The system also requires a biometric
sample from the user. It then compares the sample to or against the user-defined template.
This is called a “one-to-one” search (1:1). The system will either find or fail to find a
match between the two. Verification is commonly used for physical or computer access.
Iris Scan
Iris scanning measures the iris pattern in the colored part of the eye, although the iris
color has nothing to do with the biometric. Iris patterns are formed randomly. As a result,
the iris patterns in a person’s left and right eyes are different, and so are the iris patterns
of identical twins. Iris scanning can be used quickly for both identification and
verification applications because the iris is highly distinctive and robust.
Retinal Scan
Retinal scans measure the blood vessel patterns in the back of the eye. The device
involves a light source shined into the eye of a user who must be standing very still
within inches of the device. Because users perceive the technology to be somewhat
intrusive, retinal scanning has not gained popularity; currently retinal scanning devices
are not commercially available.
Facial Recognition
Facial recognition records the spatial geometry of distinguishing features of the face.
Different vendors use different methods of facial recognition, however, all focus on
measures of key features of the face. Because a person’s face can be captured by a
camera from some distance away, facial recognition has a clandestine or covert capability
(i.e. the subject does not necessarily know he has been observed). For this reason, facial
recognition has been used in projects to identify card counters or other undesirables in
casinos, shoplifters in stores, criminals and terrorists in urban areas.
Speaker / Voice Recognition
Voice or speaker recognition uses vocal characteristics to identify individuals using a
pass-phrase. A telephone or microphone can serve as a sensor, which makes it a relatively
cheap and easily deployable technology. However, voice recognition can be affected by
environmental factors such as background noise. This technology has been the focus of
considerable efforts on the part of the telecommunications industry and the U.S.
government’s intelligence community, which continue to work on improving reliability.
Fingerprint
The fingerprint biometric is an automated digital version of the old ink and-paper method
used for more than a century for identification, primarily by law enforcement agencies.
The biometric device involves users placing their finger on a platen for the print to be
electronically read. The minutiae are then extracted by the vendor’s algorithm, which also
makes a fingerprint pattern analysis. Fingerprint biometrics currently has three main
application arenas: large-scale Automated Finger Imaging Systems (AFIS) generally used
for law enforcement purposes, fraud prevention in entitlement programs, and physical
and computer access.
Hand/Finger Geometry
Hand or finger geometry is an automated measurement of many dimensions of the hand
and fingers. Neither of these methods takes actual prints of the palm or fingers. Spatial
geometry is examined as the user puts his hand on the sensor’s surface and uses guiding
poles between the fingers to properly place the hand and initiate the reading. Finger
geometry usually measures two or three fingers. Hand geometry is a well-developed
technology that has been thoroughly field-tested and is easily accepted by users. Because
hand and finger geometry have a low degree of distinctiveness, the technology is not
well-suited for identification applications.
Dynamic Signature Verification
We have long used a written signature as a means to acknowledge our identity. Dynamic
signature verification is an automated method of measuring an individual’s signature.
This technology examines such dynamics as speed, direction, and pressure of writing; the
time that the stylus is in and out of contact with the “paper,” the total time taken to make
the signature; and where the stylus is raised from and lowered onto the “paper.”
Keystroke Dynamics
Keystroke dynamics is an automated method of examining an individual’s keystrokes on
a keyboard. This technology examines such dynamics as speed and pressure, the total
time taken to type particular words, and the time elapsed between hitting certain keys.
This technology’s algorithms are still being developed to improve robustness and
distinctiveness. One potentially useful application that may emerge is computer access,
where this biometric could be used to verify the computer user’s identity continuously.
BIOMETRICS IN AUTHENTICATION
Authentication may be defined as “providing the right person with the right privileges the
right access at the right time.” In general, there are three approaches to authentication. In
order of least secure and least convenient to most secure and most convenient, they are:
• Something you have - card, token, key.
• Something you know- PIN, password.
• Something you are - a biometric.
Any combination of these approaches further heightens security.
Requiring all three for an application provides the highest form of security.
DISCUSSION OF FACIAL RECOGNITION
LoFACIAL RECOGNITION ALSO PROVIDES A SURVEILLANCE CAPABILITY
Desire to locate specific individuals
 Criminals
 Terrorists
 Missing Children.
Advantages of facial recognition surveillance
 Uses faces which are public.
 Involves non-intrusive contact free process
 Uses legacy databases.
 Integrates with existing surveillance system.
Although the concept of recognizing someone from facial features is intuitive,
facial recognition, as a biometric, makes human recognition a more automated,
computerized process. What sets apart facial recognition from other biometrics is that it
can be used for surveillance purposes. For example, public safety authorities want to
locate certain individuals such as wanted criminals, suspected terrorists, and missing
children. Facial recognition may have the potential to help the authorities with this
mission.
Facial recognition offers several advantages. The system captures faces of people
in public areas, which minimizes legal concerns for reasons explained below. Moreover,
since faces can be captured from some distance away, facial recognition can be done
without any physical contact. This feature also gives facial recognition a clandestine or
covert capability.
For any biometric system to operate, it must have records in its database against
which it can search for matches. Facial recognition is able to leverage existing databases
in many cases. For example, there are high quality mug shots of criminals readily
available to law enforcement. Similarly, facial recognition is often able to leverage
existing surveillance systems such as surveillance cameras or closed circuit television
(CCTV).
FIVE STEPS TO FACIAL RECOGNITIONFF (to generate template)
As a biometric, facial recognition is a form of computer vision that uses faces to attempt
to identify a person or verify a person’s claimed identity. Regardless of specific method
used, facial recognition is accomplished in a five step process.
1. CAPTURE IMAGE
First, an image of the face is acquired. This acquisition can be accomplished by digitally
scanning an existing photograph or by using an electro-optical camera to acquire a live
picture of a subject. As video is a rapid sequence of individual still images, it can also be
used as a source of facial images.
2. FIND PLACE IN IMAGE
Second, software is employed to detect the location of any faces in the acquired image.
This task is difficult, and often generalized patterns of what a face “looks like” (two eyes
and a mouth set in an oval shape) are employed to pick out the faces.
3. EXTRACT FEATURES:
Once the facial detection software has targeted a face, it can be analyzed. As noted in
slide three, facial recognition analyzes the spatial geometry of distinguishing features of
the face. Different vendors use different methods to extract the identifying features of a
face. Thus, specific details on the methods are proprietary. The most popular method is
called Principle Components Analysis (PCA), which is commonly referred to as the eigen
face method. PCA has also been combined with neural networks and local feature
analysis in efforts to enhance its performance. Template generation is the result of the
feature extraction process. A template is a reduced set of data that represents the unique
features of an enrollee’s face. It is important to note that because the systems use spatial
geometry of distinguishing facial features, they do not use hairstyle, facial hair, or other
similar factors.
4. COMPARE TEMPLATES:
The fourth step is to compare the template generated in step three with those in a
database of known faces. In an identification application, this process yields scores that
indicate how closely the generated template matches each of those in the database. In a
verification application, the generated template is only compared with one template in the
database – that of the claimed identity.
5. DECLARE MATCHES:
The final step is determining whether any scores produced in step four are high enough to
declare a match. The rules governing the declaration of a match are often configurable by
the end user, so that he or she can determine how the facial recognition system should
behave based on security and operational considerations.
HUMAN DIFFICULTIES WITH FACIAL RECOGNITION SURVEILLANCE
INHERENT OPERATOR LIMITATIONS:
 Human are not good at recognizing faces of people they do not know.
OPERATOR OVERLOAD:
 Vast amounts of information.
 Limited attention span.
 Limited accuracy.
OPERATOR RELIABILITY:
 Dedication.
 Honesty.
People are generally very good at recognizing faces that they know. However, people
experience difficulties when they perform facial recognition in a surveillance or watch
post scenario. Several factors account for these difficulties: most notably, humans have a
hard time recognizing unfamiliar faces. Combined with relatively short attention spans, it
is difficult for humans to pick out unfamiliar faces.
HOW TO REDUCE DIFFICULTIES
Finding and Identifying Faces
 Maximize control of subject’s pose.
 Maximize control of environment.
Backup Checks
 Biometric system only shows probable matches.
 Human operator should verify potential matches.
By controlling a person’s facial expression, as well as his distance from the camera, the
camera angle, and the scene’s lighting, a posed image minimizes the number of variables
in a photograph. This control allows the facial recognition software to operate under near
ideal conditions – greatly enhancing its accuracy. Similarly, using a human operator to
verify the system’s results enhances performance because the operator can detect
machine-generated false alarms.
TESTING AND EVALUATION
The following factors need to be considered with respect to testing and evaluation of
facial recognition systems:
1. Testing should be conducted by independent organizations that will not reap any
benefits should one system outperform another (i.e. no conflicts of interest involved). The
Facial Recognition Vendor Test (FVRT) testing which government agencies sponsor is
likely to be very objective.
2. The test philosophy must be considered. For example, the FVRT tries to make the test
neither too difficult nor too easy, as it does not want all the systems’ performance to
cluster at one end of the spectrum. The FVRT also wants to distinguish performance of
systems and give feedback to designers for improvement. But a drawback here is that real
life data does not present itself this way. Performance in real life may very well prove
that none of the systems are useful.
3. Vendors and developers should not know test data beforehand; otherwise, they may be
tempted to fine-tune their technology’s performance to the specific test data. Performance
data that has been fine-tuned to specific test data is not representative of the general
performance of the technology being tested.
4. Testing and evaluation should be repeatable. That is, statistically similar results should
be able to be reproduced. In the final analysis, real life deployments will be the ultimate
tests of FR systems. For now the jury is still out on the effectiveness of facial recognition
systems, however, the technology is improving. Facial recognition systems may yet
become a part of our daily lives as they improve and if they become more acceptable,
much as CCTV or surveillance camera systems have become.
CONCLUSIONS
Public sector use of facial recognition surveillance
 Facial recognition is an emerging technology, extent to which it enhances public
safety is uncertain.
 Deployable and testable in the short-run
 Not a quick fix; only a tool.
 Unlikely to run afoul of existing constitutional or other legal protections.
 Should the Virginia legislature regulate such use?
Biometric facial recognition has the potential to provide significant benefits to
society. At the same time, the rapid growth and improvement in the technology could
threaten individual privacy rights. The concern with balancing the privacy of the citizen
against the government interest occurs with almost all law enforcement techniques.
Current use of facial recognition by law enforcement does not appear to run afoul of
existing constitutional or legal protections.
Facial recognition is by no means a perfect technology and much technical work
has to be done before it becomes a truly viable tool to counter terrorism and crime. But
the technology is getting better and there is no denying its tremendous potential. In the
meantime, we, as a society, have time to decide how we want to use this new technology.
By implementing reasonable safeguards, we can harness the power of the technology to
maximize its public safety benefits while minimizing the intrusion on individual privacy.